ohai.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A cozy, fast and secure Mastodon server where everyone is welcome. Run by the folks at ohai.is.

Administered by:

Server stats:

1.8K
active users

#nodejs

26 posts25 participants8 posts today

There are a number of useful little functions in node:util besides util.inspect() that I’m only just familiarising myself with after admittedly rolling my own versions for a number of them. Hmm, should’ve read through this documentation page more carefully sooner.

e.g., util.deprecate(), util.diff(), util.debugLog(), util.isDeepStrictEqual(), etc.

New Kitten release

• Fixes #236¹: The data preview pages in Kitten’s settings how handle circular references in the deserialised data (which may contain your custom classes if that’s what you were persisting in the database).

kitten.small-web.org

:kitten:💕

PS. Those pages are very rudimentary at the moment and are good for getting quick visual overview of the data you’re persisting. For a fully interactive view, use Kitten’s interactive shell (REPL)² to explore your data until I’ve had a chance to implement a more comprehensive visual interface.

PPS. You persist data in Kitten using the built-in JavaScript Database (JSDB)³ (Or, of course, you can install and use any other database.)

¹ codeberg.org/kitten/app/issues
² kitten.small-web.org/reference
³ codeberg.org/small-tech/jsdb#j

When you have redundant web services with background scheduled tasks, how do you make sure the scheduled tasks only run on one host?

We have the hosts coordinate via a database with frequent check-ins, where one host will promoted to the "main" host to to the jobs if there is not currently or the main host is dead.

Threat actors misuse Node.js to deliver malware and other malicious payloads

Since October 2024, threat actors have been leveraging Node.js to deliver malware and payloads for information theft and data exfiltration. A recent malvertising campaign uses cryptocurrency trading themes to lure users into downloading malicious installers. The attack chain includes initial access, persistence, defense evasion, data collection, and payload delivery. The malware gathers system information, sets up scheduled tasks, and uses PowerShell for various malicious activities. Another emerging technique involves inline JavaScript execution through Node.js. Recommendations include educating users, monitoring Node.js execution, enforcing PowerShell logging, and implementing endpoint protection.

Pulse ID: 67fec5ac1e94a608250d9aa2
Pulse Link: otx.alienvault.com/pulse/67fec
Pulse Author: AlienVault
Created: 2025-04-15 20:46:36

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

How to Install #Directus on #AlmaLinux #VPS

Here's a step-by-step guide detailing how to install Directus on AlmaLinux VPS.
What is Directus?
Directus is an open-source #headless #CMS and data platform that allows you to manage and interact with your database through a RESTful API or GraphQL API. It provides a modern, user-friendly admin interface for ...
Continued 👉 blog.radwebhosting.com/how-to- #cmsapps #nodejs #npm #vpsguide #installguide #selfhosting #letsencrypt #selfhosted #postgresql

Install Directus On AlmaLinux VPS
RadWeb, LLC · How To Install Directus On AlmaLinux VPS - VPS Hosting Blog | Dedicated Servers | Reseller HostingHere's a step-by-step guide detailing how to install Directus on AlmaLinux VPS.

Since I upgraded #Nodejs in production from 20 to 22 for 100+ instances, I'm seeing a drop in CPU usage, maybe 10% or more.

But in the first four days, I also see more memory growth, including one case that required restarting the Node processes to reset the memory. I'm going to the memory change since the upgrade. Maybe there's another cause.

Można by było myśleć, że czasy wycieków pamięci to zapomniany rozdział w programowaniu, ale nic bardziej mylnego - nadal ten problem się pojawia i istnieje potrzeba, aby go badać. Tutaj autor pokazuje, jak można to robić w aplikacjach napisanych w Node.js.

#NodeJS #MemoryLeak #Programowanie

dev.to/gkampitakis/tracking-do

DEV CommunityTracking down high memory usage in Node.jsIn this article, I will share my approach of tracking down and fixing high memory usage in...